Function report |
Source Code:include\linux\tpm.h |
Create Date:2022-07-28 18:29:27 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:tpm_buf_append
Proto:static inline void tpm_buf_append(struct tpm_buf *buf, const unsigned char *new_data, unsigned int new_len)
Type:void
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct tpm_buf * | buf | |
| const unsigned char * | new_data | |
| unsigned int | new_len |
| 356 | len = tpm_buf_length(buf) |
| 359 | If flags & TPM_BUF_OVERFLOW Then Return |
| 369 | length = cpu_to_be32(len + new_len) |
| Name | Describe |
|---|---|
| osap | Create an object specific authorisation protocol (OSAP) session |
| tpm_seal | Have the TPM seal(encrypt) the trusted key, possibly based on* Platform Configuration Registers (PCRs). AUTH1 for sealing key. |
| tpm_unseal | se the AUTH2_COMMAND form of unseal, to authorize both key and blob |
| tpm2_buf_append_auth | pm_buf_append_auth() - append TPMS_AUTH_COMMAND to the buffer |
| tpm2_seal_trusted | pm2_seal_trusted() - seal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: < 0 on error and 0 on success. |
| tpm2_load_cmd | pm2_load_cmd() - execute a TPM2_Load command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: returned blob handle* Return: 0 on success. |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |